Acknowledgement
This work was supported by the Technology Innovation Program(20016800) funded By the Ministry of Trade, Industry & Energy (MOTIE, Korea) and the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2020R1F1A106890011).
References
- M.H. Lee, "A Study about Development of Environment Printing Technology and CO2," The Korean Graphic Arts Communication Society, Vol. 30, No. 3, pp. 89-114, 2012.
- L.K. Chaoui, et al., "Implementation of the Korean Green Growth Strategy in Urban Areas," OECD Regional Development Working Papers 2011/02, OECD Publishing, 2011.
- J.B. Kim, "A Study on the Utilization of Mobile Electronic Notice Service using Korean Digital Identity Guidelines," Turkish Journal of Computer and Mathematics Education, Vol. 12, No. 13, pp. 2855-2861, 2021.
- J.B. Kim, "A Study on Establishment of Connecting Information Conversion Criteria for Mobile Electronic Notification Service of Private Institutions," The Journal of the Convergence on Culture Technology, Vol. 7, No. 4, pp. 735-743, 2021. https://doi.org/10.17703/JCCT.2021.7.4.735
- Y.J. Shin, et al., "A Study on the Improvement of Personal Identification Means in South Korea - Focused on the Diagnosis and Suggestion for Improvement Direction by Professionals," The Korean Association for Regional Information Society, Vol. 20, No. 4, pp. 145~179, 2017.
- H.Y. Yum, "A proposal of assurance model based on i-PIN assurance level," The Society of Digital Policy & Management, Vol. 14, No. 9, pp. 287-299, 2016.
- J.B. Kim, "A Study on the Actual Use of Mobile Electronic Notification Service," The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 21, No. 5, pp. 167-180. 2021. https://doi.org/10.7236/JIIBC.2021.21.5.167
- T. Zhu, X. Hu, P. Xiong, W. Zhou, "The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks", IEEE Trans. On Knowledge and Data Engineering, Vol. 34, No. 6, pp. 2962-2974, 2020.
- M. S. Ferdous, R. Port, "Portable personal identity provider in mobile phones", 12th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, pp. 736-745, 2013.
- NIST, Digital Identity Guidelines, https://pages.nist.gov/800-63-3/
- Y. Ding, Y. H. Li, "Integration of Signature encryption and key exchange", IEEE Int. Conf. on Computational Intelligence and Security, vol. 2, pp. 299-302, 2008.